The Great VM Escape: ESXi Exploitation in the Wild
Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
Velociraptor Misuse, Pt. II: The Eye of the Storm
ClickFix Gets Creative: Malware Buried in Images
Gootloader Returns: What Goodies Did They Bring?
Looking Through a Pinhole at a Qilin Ransomware Attack
The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors
Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise
From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
Obscura, an Obscure New Ransomware Variant